Malicious web applications analysis 2023

25 September, 2023 | Reports

The comprehensive report we present here delves into the evolving threat landscape of 2023, offering insights into the changing face of Denial-of-Service (DDoS) attacks. This analysis draws from a wealth of intelligence, sourced from various channels, including the mail cybersecurity experts and our dedicated threat intelligence research team. Additionally, valuable information was gleaned by bots set on several public messaging platforms widely popular among cybercriminals.
There has been a significant shift in DDoS attack patterns, urging organizations to proactively adapt to these evolving cyber threats.

Shift in DDoS Attack Patterns

In the dynamic global threat landscape of 2023, Denial-of-Service attacks are undergoing a fundamental redefinition in terms of tactics, vectors, size, complexity, and the rise of hacktivist offensives. A remarkable shift in DDoS attack patterns was observed, with the number of malicious web application transactions surging by 500 times compared to the same period in 2022. This shift signifies a move from network layer attacks to application layer attacks.
In the second quarter of 2023, attacks featuring a DNS Flood vector nearly doubled compared to the attack ratios observed in 2021 and most of 2022.
The relative number of large-scale attacks (exceeding 100Gbps) saw a sharp rise, increasing from nearly 4 times in 2022 to more than 10 times in 2023, outpacing the growth in smaller and mid-sized attacks. It also increased their complexity. Attacks exceeding 1Gbps featured more than two dissimilar attack vectors on average, while those surpassing 100Gbps boasted over eight dissimilar attack vectors.

Location and targets

The hacktivist-claimed DDoS attackes took place mostly in India, United States, Israel and Eastern Europe, aiming Government/public websites, followed by large corporations sites.

Industries under attack

The highest share accounted was suffered by Research and Education, that had more than 30% of the DDoS attack volume, followed by generic Service Providers and Technology.

These findings highlight the dynamic and evolving nature of cyber threats in 2023, emphasizing the critical importance of site reliability engineering and load balancing to fortify organizations against the changing landscape of cyberattacks. Vigilance and adaptability are key in staying ahead of malicious actors seeking to exploit vulnerabilities in online applications and infrastructure.

We encourage you to Enjoy the Site Reliability Experience! Contact us if you want to know more.

SHARE ON:

Related Blogs

Posted by reluser | 02 December 2024
Understanding Blue Yonder Blue Yonder is a global leader in supply chain management software, offering advanced solutions designed to streamline logistics, inventory, and workforce operations. Leveraging artificial intelligence and machine…
31 LikesComments Off on Ransomware Attack on Blue Yonder: Impacts on Starbucks and Beyond
Posted by reluser | 24 October 2024
Digital infrastructures form the backbone of national operations, so the need for robust disaster recovery (DR) systems has never been more critical. Recent events in Indonesia underscore the vulnerability of…
59 LikesComments Off on The Crucial Need for Governments to Implement Disaster Recovery Systems
Posted by reluser | 10 October 2024
The oil and gas industry, crucial to the global economy, faces significant cybersecurity challenges as it embraces digital transformation. Advanced technologies optimize operations and increase productivity, but they also expose…
71 LikesComments Off on Cybersecurity in the Oil and Gas Industry: Building a Resilient Future